-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support multiple Submission Keys #1197
Comments
This feels like a potentially relatively small and well-scoped problem to tackle and possibly include in the next workstation release.
👍
What would be the downside of keeping old keys? We could also just reconsider recreating sd-gpg but for that it would be useful for the keys to also exist in dom0.
Would the argument for this be that the less places we have the key in, the better? In general I find that having one source of truth (i.e. dom0 in this case) and being able to recreate things at will, to be a pretty useful position to be in. Also, when someone does Btw, looking at this I've realized that we're currently importing the key via salt |
To the first point, IMO it's better in general to be able to define what keys are expected to be present, so you can tell if there are are deviations from state. But I now realize that this actually is in conflict with the second point you mention (questioning not keeping key copies in dom0) so maybe that one needs to be struck? If you both have the exact expected fingerprints in the config, and the keys backed up in dom0, you're rigght, we could recreate sd-gpg consistently anytime. |
When we tackle this, it could be a good chance to do also improve #1197 |
In some cases, SD instances may have multiple Submission Keys in use - the latest active one as deployed on the server, plus an arbitrary number of old Submission Keys in the SVS or SDW's
sd-gpg
, kept around to decrypt old submissions.SecureDrop Client doesn't distinguish between keys. If submissions encrypted against older keys are present, and the keys in question are in sd-gpg, they will be decrypted and displayed as normal.
sdw-admin
, however, only supports configuring with a single key at a time. If you want to add multiple keys viasdw-admin --apply
, you need to updateconfig.json
(and thereby qubesdb) with each new key's details and rerun the command.This is suboptimal for a number of reasons: short of deleting and reprovisioning
sd-gpg
from scratch, there's no way to ensure that only the expected keys are present;config.json
doesn't actually describe the state of the system; and it's just a bad UX in general with lots of potential for errors.Instead:
config.json
should support listing multiple key FPRs instead of just one.sdw-admin --apply
should ensure that all listed keys and only listed keys should be present in sd-gpg(optional) it should not be necessary to keep secret keys in dom0 - if they're already in sd-gpg then they would not be updated. If they're not in sd-gpg they should be temporarily available in the dom0 sdw config dir, and removed after successful provisioning to sd-gpg(struck after comments)The text was updated successfully, but these errors were encountered: